Down the Security Rabbithole Podcast #DtSR with Los and Tuma talking all things #cybersecurity

This week's #DtSR Podcast featured Raf Los and guest Shawn Tuma talking about all things cybersecurity. Check out more of what was covered and listen to the podcast here! Check out some of the past episodes with Tuma as a guest.   Share on social media and join in the discussion! https://twitter.com/DtSR_Podcast/status/970887006061547521 ______________________ Shawn Tuma (@shawnetuma) … Continue reading Down the Security Rabbithole Podcast #DtSR with Los and Tuma talking all things #cybersecurity

Security Weekly guest Shawn Tuma discusses “what is reasonable cybersecurity?”

https://youtu.be/3FkeAV4N-rs?t=4m3s Share on social media and join in the discussion! LinkedIn Post https://www.facebook.com/ComputerDataPrivacy/posts/1661689630578270   https://twitter.com/shawnetuma/status/969768904112398336 ______________________ Shawn Tuma (@shawnetuma) is an attorney with an internationally recognized reputation in cybersecurity, computer fraud, and data privacy law. He is a Cybersecurity & Data Privacy Attorney at Scheef & Stone, LLP, a full-service commercial law firm in Texas that represents … Continue reading Security Weekly guest Shawn Tuma discusses “what is reasonable cybersecurity?”

What is “reasonable cybersecurity” and how do courts view it? (SecureWorld interviews)

What is "reasonable cybersecurity" and how do courts view "reasonable cybersecurity"? See KnowB4's discussion of these interviews These are two excellent questions that I was asked and I answered, as succinctly as I could, in two short interviews with SecureWorld. Tell me what you think about my answers. What Is Reasonable Cybersecurity? - SecureWorld article … Continue reading What is “reasonable cybersecurity” and how do courts view it? (SecureWorld interviews)

Uber CISO’s Testimony Clarifies Payment to Hackers was Not Legitimate Use of Bug Bounty Program

As bits of information about the Uber data breach have trickled out, including the purported payment through a bug bounty program, I have been concerned about the implications on legitimate corporate bug bounty programs. My concerns grew when I read the New York Times article, Inside Uber’s $100,000 Payment to a Hacker, and the Fallout.  … Continue reading Uber CISO’s Testimony Clarifies Payment to Hackers was Not Legitimate Use of Bug Bounty Program

3 Legal Points for InfoSec Teams to Consider Before an Incident

As a teaser to my presentation at SecureWorld - Dallas last week, I did a brief interview with SecureWorld and talked about three of the points I would make in my lunch keynote, The Legal Case for Cybersecurity. If you're going to SecureWorld - Denver next week, join me for the lunch keynote on Thursday (11/2) … Continue reading 3 Legal Points for InfoSec Teams to Consider Before an Incident